About Skills Ops Missions Contact
root@redteam:~/portfolio$ ./init_target.sh --mode offensive
M0H4M3D F4Z1L
Cybersecurity Engineer  |  VAPT Specialist  |  AI/ML Enthusiast
Focused on identifying and mitigating real-world security vulnerabilities
using modern offensive and defensive techniques — and building
AI-driven systems that make the digital world measurably safer.
9+ Months Ops
5+ Missions
10+ Certs
8.9 CGPA
View Missions Initiate Contact Download Resume
[01]

// About

Cybersecurity-focused Computer Science student with hands-on experience in Vulnerability Assessment and Penetration Testing (VAPT), combined with strong knowledge in AI/ML.

Experienced in identifying, exploiting, and reporting real-world vulnerabilities in web applications using tools like Burp Suite, Nmap, and Metasploit — following OWASP guidelines and industry-standard reporting practices.

Passionate about building secure and intelligent systems by integrating AI-driven approaches into cybersecurity — from deepfake detection to anomaly analysis. Currently seeking roles in Cybersecurity, VAPT, or Security Engineering.

  whoami.sh
$ cat profile.json
{ "name": "Mohamed Fazil Rahman Z",
  "role": "Cybersecurity + AI/ML",
  "location": "Chennai, IN",
  "cgpa": "8.9",
  "status": "ACTIVE" }
$ ls -la ./skills
drwxr-xr-x VAPT/
drwxr-xr-x AI_ML/
drwxr-xr-x FullStack/
drwxr-xr-x DevOps/
$ echo $OBJECTIVE
# "Hack the planet. Secure the future."
[02]

// Arsenal

[] Cybersecurity & VAPT Core Expertise
  • Web Application Security Testing (OWASP Top 10)
  • Vulnerability Assessment & Penetration Testing (VAPT)
  • API Security Testing — REST APIs, JWT, Auth flaws
  • Authentication & Session Management Testing
  • Security Misconfiguration & Access Control (IDOR)
  • Basic Network Security Testing
[] Exploitation & Attack Techniques Offensive
  • Cross-Site Scripting — XSS (Stored, Reflected, DOM-based)
  • SQL Injection — Manual & SQLMap
  • IDOR — Insecure Direct Object Reference
  • Cross-Site Request Forgery (CSRF)
  • File Upload Vulnerability Exploitation
  • Directory Traversal & Enumeration
  • Basic Authentication Bypass Techniques
[] Security Tools Hands-on
  • Burp Suite — Interceptor, Intruder, Repeater, Scanner
  • Nmap — Network Scanning & Service Enumeration
  • Gobuster — Directory & Subdomain Brute-forcing
  • Wireshark — Packet Analysis & Traffic Inspection
  • Metasploit — Exploitation Framework
  • Kali Linux — Penetration Testing Environment
[] Networking & Network Security Infrastructure
  • TCP/IP Protocol Suite — HTTP/S, DNS, FTP, SMTP
  • Network Scanning & Enumeration
  • Packet Analysis using Wireshark
  • Subnetting & Network Fundamentals
  • Firewall & IDS/IPS Basics
  • VPN & Secure Communication Concepts
  • Network Attacks — MITM, ARP Spoofing, DNS Spoofing (Lab)
[] Programming & Scripting Dev
  • Python — Automation & Security Scripting
  • Bash — Linux Command-line & Automation
  • JavaScript — Client-side understanding for web attacks
  • SQL — Database querying & injection understanding
  • C / Java — Core programming fundamentals
[] Artificial Intelligence & ML AI/ML
  • Machine Learning — Supervised & Unsupervised
  • Deep Learning — TensorFlow, PyTorch
  • Data Analysis — Pandas, NumPy, Matplotlib
  • Computer Vision — OpenCV
  • Natural Language Processing — NLTK
  • Generative AI — LLMs, HuggingFace APIs
[] AI + Cybersecurity Integration Differentiator
  • Deepfake Detection using Deep Learning & Computer Vision
  • AI-based Pattern Recognition & Anomaly Detection
  • Exploring AI applications in Threat Detection & Analysis
[] Cloud, DevOps & Infrastructure Ops
  • Microsoft Azure — Fundamentals
  • CI/CD Concepts — Jenkins
  • IIS Server Deployment
  • Docker — Basic Usage
  • Version Control — Git, SVN
[] Security Reporting & Documentation Professional
  • Vulnerability Reporting (OWASP Standard)
  • CVSS Scoring — Basic Understanding
  • Risk Analysis & Remediation Recommendations
  • Technical Documentation & Report Writing
  • Web & Backend Understanding — REST APIs, Auth Mechanisms, Full Stack Basics
[03]

// Ops Log

Web Development Intern
CodSoft  — Online
Jun – Jul 2024
  • Developed a movie website with structured UI and dynamic content using HTML, CSS, and JavaScript
  • Built a functional calculator application implementing core JavaScript logic and DOM manipulation
  • Designed and implemented a responsive landing page with modern UI/UX principles
  • Practiced clean code structure, reusable components, and improved understanding of client-side scripting
HTML CSS JavaScript
AI/ML Intern
Altruisty Innovation Pvt. Ltd.  — Hybrid
Dec 2024 – Feb 2025
  • Built end-to-end ML pipelines — from data cleaning and normalization to model training and performance evaluation
  • Implemented supervised and unsupervised learning algorithms including classification and clustering models
  • Trained Artificial Neural Networks (ANN) with multiple epochs; analyzed accuracy and loss graphs to detect overfitting/underfitting
  • Applied feature selection and dataset preparation techniques to improve model efficiency by measurable margins
Python Pandas NumPy Scikit-learn TensorFlow/Keras Matplotlib
Software Development Intern
C2C Advanced Systems
6 MONTHS
  • Built and maintained 3+ enterprise-grade software modules using .NET and C#, improving internal workflow efficiency
  • Managed version control for a team of 5+ developers using Git and SVN; reduced merge conflicts through structured branching
  • Deployed and configured applications on IIS servers with Azure cloud integration as part of the CI/CD pipeline
  • Collaborated across cross-functional teams to deliver features on schedule within Agile sprint cycles
.NET C# IIS Azure Git SVN Jenkins
Cybersecurity Intern — VAPT
Logic Apps
3 MONTHS
  • Conducted VAPT on 5+ web applications, identifying critical vulnerabilities including XSS, IDOR, SQL Injection, and security misconfigurations
  • Used Burp Suite and Nmap to discover, enumerate, and exploit security flaws across web and network layers
  • Delivered OWASP-standard vulnerability reports with CVSS scores, risk ratings, and clear remediation recommendations
  • Collaborated with developers to patch identified vulnerabilities, reducing the overall attack surface significantly
Burp Suite Nmap Metasploit Wireshark OWASP Kali Linux
[04]

// Missions

Cybersecurity Projects
SEC_01 Automated VAPT
Automated VAPT Tool

Python-based automated Vulnerability Assessment tool to identify common security flaws in web applications.

  • Scans web applications for OWASP Top 10 vulnerabilities
  • Detects XSS, SQL Injection patterns, and security misconfigurations
  • Generates structured reports with vulnerability details and remediation suggestions
  • Designed for educational and controlled testing environments
Python Requests BeautifulSoup
SEC_02 Social Engineering
Phishing Awareness Simulation

Phishing simulation system to demonstrate social engineering attacks and raise user awareness in controlled environments.

  • Generates simulated phishing links for controlled testing
  • Tracks user interaction to measure awareness levels
  • Demonstrates risks of credential harvesting attacks
  • Designed strictly for cybersecurity awareness and training
Node.js Express HTML/CSS JavaScript
SEC_03 Defensive Monitoring
Honeypot System

Basic honeypot implementation to detect, log, and analyze unauthorized access attempts and attacker behavior.

  • Simulates vulnerable services to attract and trap attackers
  • Logs intrusion attempts and attacker behavioral patterns
  • Helps understand common attack vectors and reconnaissance techniques
  • Useful for learning defensive monitoring strategies
Python Linux Networking
SEC_04 Security Research
⌨ Keylogger — Security Research

Keylogger prototype built in a controlled lab environment to study keystroke capture techniques and associated endpoint security risks.

  • Captures and logs keystrokes for analysis and study
  • Demonstrates how malicious software can monitor user activity
  • Used for studying endpoint security and detection mechanisms
  • Built strictly for ethical and educational purposes
Python
AI / ML Projects
AI_01 Deep Learning
Multimedia Forensic Application

AI-powered deepfake detection system leveraging deep learning models to analyze and expose manipulated media content.

  • Detects deepfake videos and manipulated images using neural networks
  • Advanced computer vision algorithms for high-accuracy classification
  • Deployed via Flask with a clean forensic-grade interface
Python TensorFlow OpenCV Flask
AI_02 Generative AI
StoryBook Generator

Generative AI application that creates illustrated storybooks using large language models and AI image generation.

  • Users input themes and parameters to generate unique personalized stories
  • Integrated NLP and image generation using HuggingFace API
  • Built with Python, NLTK, and Streamlit for rapid prototyping
Python GenAI HuggingFace NLTK Streamlit
Full Stack Project — Internship
FS_01 Enterprise System
Enterprise Internal Management System

Comprehensive Internal Management System developed during internship, supporting multiple organizational operations across 8+ core modules.

Key Modules
  • Dashboard & Analytics
  • Employee & Team Management
  • Project & Task Tracking
  • Inventory & Asset Management
  • Leave Management System
  • Service Desk & Ticketing System
  • Customer & User Management
  • Administration & Role-Based Access Control
Responsibilities
  • Built responsive UI components using React.js
  • Developed backend APIs using Node.js and Express
  • Designed and managed relational databases in MySQL
  • Implemented role-based access and data handling logic
  • Collaborated with version control (Git/SVN) in a team environment
  • Handled deployment and server-side configuration (IIS / Azure)
React.js Node.js Express.js MySQL Git/SVN IIS Azure
[05]

// Training Arc

B.E. Computer Science Engineering
Jerusalem College of Engineering
Specialization: Cybersecurity  |  2021 – 2026
CGPA: 8.9
Honours — Artificial Intelligence & Machine Learning
Jerusalem College of Engineering
2023 – 2026
Class XII — Computer Science
Santhome Higher Secondary School
2019 – 2020
Score: 71%
Class X
Santhome Higher Secondary School
2021 – 2022
Score: 70%
[06]

// Clearances

[]
Cyber Security Club of JCE — Club President
2023 – 2024
[]
Hackelite National Level Technical Symposium — Event Coordinator
2023 – 2024
[]
Internship Training on AI & ML — Altruisty Innovation Pvt. Ltd.
Certified
[]
PeCan Capture the Flag (CTF) — Edith Cowan University / IIT Madras
Top-Performing Team Recognition
[]
Shell NXplorers Hackathon — A New Way of Thinking
Certificate of Participation
[07]

// Ping Me

Let's Connect

Open to cybersecurity roles, AI/ML projects, VAPT engagements, and collaborations with fellow hackers and builders. Drop a message or connect via the channels below.